Efficient revocable identity-based encryption via subset difference methods

被引:0
|
作者
Kwangsu Lee
Dong Hoon Lee
Jong Hwan Park
机构
[1] Sejong University,
[2] Korea University,undefined
[3] Sangmyung University,undefined
来源
关键词
Identity-based encryption; Revocable identity-based encryption; Key revocation; Subset difference method; Bilinear maps; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Providing an efficient revocation mechanism for identity-based encryption (IBE) is very important since a user’s credential (or private key) can be expired or revealed. revocable IBE (RIBE) is an extension of IBE that provides an efficient revocation mechanism. Previous RIBE schemes essentially use the complete subtree (CS) scheme of Naor, Naor and Lotspiech (CRYPTO 2001) for key revocation. In this paper, we present a new technique for RIBE that uses the efficient subset difference (SD) scheme of Naor et al. instead of using the CS scheme to improve the size of update keys. Following our new technique, we first propose an efficient RIBE scheme in prime-order bilinear groups by combining the IBE scheme of Boneh and Boyen and the SD scheme and prove its selective security under the standard assumption. Our RIBE scheme is the first RIBE scheme in bilinear groups that has O(r) number of group elements in an update key where r is the number of revoked users. Next, we also propose another RIBE scheme in composite-order bilinear groups and prove its full security under static assumptions. Our RIBE schemes also can be integrated with the layered subset difference scheme of Halevy and Shamir (CRYPTO 2002) to reduce the size of a private key.
引用
收藏
页码:39 / 76
页数:37
相关论文
共 50 条
  • [31] Revocable Identity-Based Encryption Revisited: Security Model and Construction
    Seo, Jae Hong
    Emura, Keita
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 216 - 234
  • [32] Revocable Identity-Based Encryption with Decryption Key Exposure Resistance
    Wang, Xiaoyi
    Chen, Hu
    Zhao, Jiangdong
    Computer Engineering and Applications, 2024, 60 (19) : 268 - 277
  • [33] Adaptive-ID Secure Revocable Identity-Based Encryption
    Libert, Benoit
    Vergnaud, Damien
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 1 - +
  • [34] An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area Network
    Tsai, Tung-Tso
    Lin, Han-Yu
    Chang, Hsiao-Chieh
    JOURNAL OF SENSORS, 2022, 2022
  • [35] Revocable identity-based encryption with server-aided ciphertext evolution
    Sun, Yinxia
    Mu, Yi
    Susilo, Willy
    Zhang, Futai
    Fu, Anmin
    THEORETICAL COMPUTER SCIENCE, 2020, 815 : 11 - 24
  • [36] New Constructions of Revocable Identity-Based Encryption From Multilinear Maps
    Park, Seunghwan
    Lee, Kwangsu
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (08) : 1564 - 1577
  • [37] Efficient biometric identity-based encryption
    Li, Xiaoguo
    Xiang, Tao
    Chen, Fei
    Guo, Shangwei
    INFORMATION SCIENCES, 2018, 465 : 248 - 264
  • [38] Identity-based Encryption with Efficient Revocation
    Boldyreva, Alexandra
    Goyal, Vipul
    Kumar, Virendra
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 417 - 426
  • [39] Server-Aided Revocable Identity-Based Encryption from Lattices
    Khoa Nguyen
    Wang, Huaxiong
    Zhang, Juanyang
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 107 - 123
  • [40] Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption
    Seo, Jae Hong
    Emura, Keita
    ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 21 - 38